DocumentCode :
2773473
Title :
Holding management accountable: a new policy for protection against computer crime
Author :
Wilson, Clay
Author_Institution :
Comput. Security Officer for the Congressional Res. Service, Libr. of Congress, USA
fYear :
2000
fDate :
2000
Firstpage :
272
Lastpage :
281
Abstract :
Attacks by cyber criminals can be potentially just as damaging to the national infrastructure as attacks by cyber terrorists. Effective security countermeasures to combat computer crime parallel those used to protect against potential threats due to cyber terrorism and information warfare. Federal data about crime indicate that the growth in prosecution of computer crime is lower than the growth of computer incidents. A survey of the attitudes and activities of college students also revealed that current policy does not provide a strong deterrent to computer crime. Current policy, as expressed in the Computer Fraud and Abuse Act, does not hold organizational management accountable when their computers are broken into by hackers. However, security organizations repeatedly state that many if not most, computer intrusions occur largely because the host operating system has not had the latest fixes applied. Sometimes notices of system vulnerabilities have been widely published for months, but because available fixes were not applied, hackers using sophisticated attack tools, were able to locate exposed hosts on the Internet and attack those vulnerabilities. Hackers share vulnerability information via informal groups linked through the Internet, while government and private industry are reluctant to share vulnerability information. This characteristic gives attackers an advantage that helps them exploit host weaknesses. A recommendation is made to hold managers in the government and private sector more accountable for keeping their computer assets updated with the latest operating system fixes, to improve computer security and protect the national infrastructure
Keywords :
computer crime; Computer Fraud and Abuse Act; Internet; computer crime; computer hacker; cyber criminal; cyber terrorist; information warfare; management accountability; national infrastructure; operating system; security organization; Computer crime; Computer hacking; Computer security; Data security; Government; Information security; Internet; Operating systems; Protection; Terrorism;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
National Aerospace and Electronics Conference, 2000. NAECON 2000. Proceedings of the IEEE 2000
Conference_Location :
Dayton, OH
Print_ISBN :
0-7803-6262-4
Type :
conf
DOI :
10.1109/NAECON.2000.894921
Filename :
894921
Link To Document :
بازگشت